handsomelky / Shamir-Image-Secret-Sharing
This repository contains an implementation of Shamir's Secret Sharing algorithm tailored for image files.
☆19Updated 7 months ago
Alternatives and similar repositories for Shamir-Image-Secret-Sharing:
Users that are interested in Shamir-Image-Secret-Sharing are comparing it to the libraries listed below
- A page containing many useful links.☆25Updated 4 months ago
- ☆37Updated 2 years ago
- 一款国产化轻量级S盒的密码学性质检测⼯具☆17Updated 9 months ago
- 基于全同态加密的安全人脸识别系统/Secure Face Recognition System based on Fully Homomorphic Encryption☆141Updated last year
- SOCI is a Secure Outsourced Computation on Integers based on the Paillier cryptosystem and a twin-server architecture☆116Updated last year
- SOCI is a Secure Outsourced Computation on Integers based on the Paillier cryptosystem and a twin-server architecture☆104Updated last year
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆21Updated last year
- ☆14Updated 3 months ago
- SOCI is a Secure Outsourced Computation on Integers based on the Paillier cryptosystem and a twin-server architecture☆99Updated last year
- Paper Notes in MPC with Applications to PPML☆64Updated 9 months ago
- Python wrapper for the PBC (Pairing-Based Cryptography) library☆11Updated 10 months ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆28Updated 4 years ago
- Secure Aggregation for FL☆34Updated last year
- [arXiv'21] Additively Symmetric Homomorphic Encryption for Cross-Silo Federated Learning☆21Updated last year
- 支持数据撤销的模型成员推理攻击工具箱☆40Updated 3 weeks ago
- ☆23Updated last year
- 数字水印算法(利用matlab实现)☆29Updated 5 years ago
- ☆29Updated last year
- Homomorphic Encryption and Federated Learning based Privacy-Preserving☆64Updated last year
- Secure Aggregation for Federated Learning with Malicious Actors☆24Updated 2 years ago
- Repository for collection of research papers on multi-party learning.☆32Updated last year
- Verifiable Forward Secure SSE scheme☆10Updated 4 years ago
- ☆18Updated 5 years ago
- PPA attack code☆12Updated 2 years ago
- 全国密码技术竞赛论文 latex模板☆10Updated last year
- 本科毕业设计,实现图像隐写分析以及隐写去除,其中隐写分析采用SRNet网络模型,隐写去除采用DDSP网络模型☆61Updated 3 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆70Updated 6 months ago
- personal implementation of secure aggregation protocol☆44Updated 11 months ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated 5 months ago
- Code repository for the paper at USENIX Security'24☆24Updated 5 months ago